← back to SAML overview

Microsoft Entra ID - SAML login on CloudAMQP

  1. Go to https://portal.azure.com > Enterprise applications > New application > Create new application > Non-gallery application Azure SAML Setup
  2. Click New Application
  3. Azure SAML Setup
  4. Click Non-gallery Application. Enter the name of your new app in the right hand section, i.e. CloudAMQP and click Add Azure SAML Setup The application is now created.
  5. Go back to Home - Enterprise Applications - All applications and search for your newly created app if you dont see it in the list. Azure SAML Setup Click on the app to open it.
  6. Go to Single sign-on using the link on the left side. Azure SAML Setup
  7. Click SAML Azure SAML Setup
  8. Click the edit pen for Basic SAML Configuration
  9. Add Identifier (Entity ID) and Reply URL (Assertion Consumer Service URL) with the values you'll find at https://customer.cloudamqp.com/team/saml. NOTE: Leave the Sign on URL field BLANK. Click Save Azure SAML Setup
  10. Download the Federation Metadata XML and upload it at https://customer.cloudamqp.com/team/saml Azure SAML Setup
  11. Add users and/or groups that should have access.

    Please note that if an account is removed from the "Users and groups" in Azure, the account will still have access in the CloudAMQP console and the user will need to be deleted from the CloudAMQP console to cease access. Azure SAML Setup
  12. Important: When SAML has been configured, the first login for any new users (not existing in CloudAMQP) will have to be IdP-initiated. This means new users will not be able to sign in for the first time using the Sign in with SAML on the CloudAMQP login page, but instead they will login via https://myapps.microsoft.com/ Azure SAML Setup

    For existing users, they will an invite to the CloudAMQP Team by admins (shown below). From there, they will then log in via https://myapps.microsoft.com/

    CloudAMQP console printscreen Afterwards, all users able to log in via Sign in with SAML on the CloudAMQP login page.

[Optional] Assigning roles and tags

    There are several ways to assign and manage roles and/or tags:

    • Provision user roles through a User Property
    • Provision user roles and tags through Users and Groups via app roles

Provision user roles through a User Property

    This means utilising any of the User Property fields, i.e. an Extension attribute, to assign a CloudAMQP role.

  1. Let's begin by setting up the User Property field, in this example we'll be using the Job title field. Navigate to your Enterprise application and click Manage > Users and Groups.
  2. Select on one of the users, navigate to the Properties tab and input a CloudAMQP role in the Job title field. In this example, the role "Monitor" will be assigned to the user. Each user will need to specify a role so this can be assigned automatically on CloudAMQP. Roles can be found at https://customer.cloudamqp.com/team/saml Azure SAML Setup
  3. Now we'll link the Property field to the Single sign-on application. Start by opening the Enterprise application > Manage > Single sign-on , and click the pen symbol at the User attributes and Claims section Azure SAML Setup
  4. Click Add new claim and enter the following

    Name: 84codes.roles

    Source: Transformation, this opens the option to select Transformation: Join().

    Parameter 1: Enter the key found at https://customer.cloudamqp.com/team/saml

    Separator: "/"

    Parameter 2: select user.jobtitle, or any field from the user profile you wish to use to specify the CloudAMQP role to assign.

    Click Save Azure SAML Setup

Provision user roles and tags through Users and Groups via app roles

    This means having the ability to assign multiple app roles to have both roles and multiple tags if desired. You can create many groups and tags to achieve different role/tag combinations. For example, "Devops" group users can have access to instances under the "Production" and "Staging" tags, and "Member" group users can only access instances under the "Developer" tag.

    • In this example, let's start by setting up a separate group per role/tag and assigning users. Here, we've create the group "CloudAMQP_devops" and added members to the group who require the devops role. Azure SAML Setup
    • Next, we'll create the app role that specifies the role or tag. Navigate to Microsoft Entra ID > Manage > App registrations and locate your application. Then navigate to Manage > App roles. Here, we've created the "CloudAMQP_devops" app role to assign the role "devops".

      You'll need to create an app role for each role and tag you want to assign. The value requires the key found at https://customer.cloudamqp.com/team/saml , a separator "/" and your role or tag value. Here, we've used "devops". Azure SAML Setup
    • Once the app roles are created, we can assign app roles to users or groups. Start by navigating to your Enterprise Application > Manage > Users and groups. Click Add user/group to assign app roles. Azure SAML Setup
    • Now we will configure SAML to use the assigned roles by creating a claim. Navigate to your CloudAMQP Enterprise application to add the "user.assignedroles" as a claim. Click Single sign-on and the pen symbol next to attributes and claims. In the claim, assign attribute "user.assignedroles" to "84codes.roles". Azure SAML Setup

    Please note:

    • New users on CloudAMQP (i.e. no existing user account on CloudAMQP) will need to login via https://myapps.microsoft.com/ to be automatically provisioned. Afterwards, they will be able to log in via Sign in with SAML on the CloudAMQP login page.
    • Existing users not part of the team will need to be invited to the CloudAMQP team and then log in via https://myapps.microsoft.com/ to apply the user role/tags. Please note the invite doesn't need to have the exact role/tags in CloudAMQP as it will be overridden when they login via myapps. Afterwards, they will be able to log in via Sign in with SAML on the CloudAMQP login page.